CVE-2021-3609

Related Vulnerabilities: CVE-2021-3609  

A flaw was found in the Linux kernel. A race condition occurs between bcm_release() and bcm_rx_handler() leading to various use-after-free's in bcm_rx_handler() and, depending on the provided flags, also in bcm_rx_timeout_handler(). The use-after-free's in combination with a heap spray may lead to sensitive socket data being overwritten, resulting in local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Description

A flaw was found in the Linux kernel. A race condition occurs between bcm_release() and bcm_rx_handler() leading to various use-after-free's in bcm_rx_handler() and, depending on the provided flags, also in bcm_rx_timeout_handler(). The use-after-free's in combination with a heap spray may lead to sensitive socket data being overwritten, resulting in local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Statement

Red Hat Product Security is aware of this issue. Updates will be released as they become available.

Red Hat Product Security is aware of this issue. Updates will be released as they become available.

Mitigation

In order to mitigate this issue it is possible to prevent the affected code from being loaded by blocklisting the kernel module can-bcm. For instructions relating to how to blocklist a kernel module refer to: https://access.redhat.com/solutions/41278 .

Additional Information

  • Bugzilla 1971651: CVE-2021-3609 kernel: race condition in net/can/bcm.c leads to local privilege escalation
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • FAQ: Frequently asked questions about CVE-2021-3609